DOI QR코드

DOI QR Code

Key Establishment Mechanism for Clustered Sensor Networks Through Nodes' Location Estimation

노드 위치 예측을 통한 클러스터링 기반의 센서네트워크 키설정 메커니즘

  • 도인실 (이화여자대학교 컴퓨터공학과) ;
  • 채기준 (이화여자대학교 컴퓨터공학과)
  • Received : 2009.10.20
  • Accepted : 2010.02.24
  • Published : 2010.04.30

Abstract

Sensor network can be applied in many areas in our life, and security is very important in applying sensor network. For secure sensor communication, pairwise key establishment between sensor nodes is essential. In this paper, we cluster the network field in hexagonal shapes and preassign three different kinds of key information for each sensor according to its expected location. We adopt overlapped key string pool concept for our clustered network architecture and every node uses the part of sub-strings for setting up pairwise keys with all neighboring nodes in its own cluster and from different clusters according to respective position with small amount of information. Our proposal decreases the memory requirement and increases security level efficiently.

다양한 분야에서 응용될 수 있는 센서 네트워크 통신에 안전성을 제공하기 위해서는 센서 노드 간 pairwise 키설정이 기본이 되어야한다. 본 논문에서는 네트워크 필드를 육각형의 클러스터로 나누고 각 센서 노드마다 예상되는 위치에 따라 세 개의 서로 다른 키 정보를 사전에 나누어 주어 노드 배치 후 갖고 있는 정보를 이용하여 모든 이웃 노드와의 pairwise 키를 설정할 수 있도록 한다. 특히 키스트링 기법을 적용하여 이를 클러스터링 정보와 연계되도록 함으로써 적은 양의 정보를 가지고도 이웃한 모든 노드들 간에 pairwise 키를 설정할 수 있도록 하였다. 제안된 키설정 메커니즘을 통하여 필요한 메모리의 양을 줄이면서도 보안 강도를 높일 수 있음을 증명한다.

Keywords

References

  1. D.W. Carman, P.S. Kruus, and B.J.Matt, “Constraints and approaches for distributed sensor network security,” Technical report, NAI Labs, 2000.
  2. R. Blom, “An optimal class of symmetric key generation systems. Advances in Cryptology,” Proc. of EUROCRYPT'84, LNCS 209, 1985.
  3. L. Eschenauer and V.D. Gligor, “A key management scheme for distributed sensor networks,” Proc. of the 9th ACM CCS'02, pp.41-47, 2002. https://doi.org/10.1145/586110.586117
  4. H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” IEEE Symposium on Research in Security and Privacy, pp.197-213, 2003.
  5. W. Du, J. Deng, Y. S. Han, and P. Varshney, “A pairwise key predistribution scheme for wireless sensor networks,” Proc. of 10th ACM CCS'03, 2003. https://doi.org/10.1145/948109.948118
  6. D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” Proc. of 10th ACM CCS'03, pp.52-61, 2003. https://doi.org/10.1145/948109.948119
  7. C. Blundo, A. De Santis, Amir Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-secure key distribution for dynamic conferences,” In Advances in Cryptology, CRYPTO'92, LNCS 740, pp.471-486, 1993.
  8. W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” Proc. of IEEE INFOCOM, 2004. https://doi.org/10.1109/INFCOM.2004.1354530
  9. Z. Yu and Y. Guan, “A Robust Group-based Key Management Scheme for Wireless Sensor Networks,” IEEE Communications Society, WCNC 2005.
  10. B. Lai, D. Hwang, S. Kim, and I. Verbauwhede, “Reducing radio energy consumption of key management protocols for wireless sensor networks,” Proc. of ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED'04), pp.351-356, 2004. https://doi.org/10.1145/1013235.1013320
  11. I. Doh, K. Chae, “A key setup mechanism utilizing dual key strings for secure sensor communication,” Proc. of 9th International Conference on Advanced Communication Technology(ICACT), 2007. https://doi.org/10.1109/ICACT.2007.358558
  12. D. Huang, M. Mehta, D. Medhi, L. Harn, “Location-aware key management scheme for wireless sensor networks,” Proc. of ACM Workshop Security of Ad Hoc and Sensor Networks, 2004. https://doi.org/10.1145/1029102.1029110
  13. A. Durresi, V. Bulusu, V. Paruchuri, L. Barolli, “SCON: Secure management of continuity in sensor networks,” Computer Communications 29, 2458-2468, 2006. https://doi.org/10.1016/j.comcom.2006.02.002
  14. Seyit A. Camtepe, Bulent Yene, “Key Distribution Mechanism for Wireless Sensor Networks : a Survey,” TR-05-07 Rensselaer Polytechnic Institute, Computer Science Department, March, 2005.
  15. S. Zhu, S. Setia, S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS'03), pp.62-72, 2003. https://doi.org/10.1145/948109.948120
  16. M. Wen, Y. Zheng, W. Ye, Ke. Chen, W. Qui, “A key management protocol with robust continuity for sensor networks,” Computer Standards & Interfaces 31 642-647, 2009. https://doi.org/10.1016/j.csi.2008.06.005